Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks the hosts file to determine is the system is compromised
Detailed Explanation for this Vulnerability Assessment
The remote Windows host may be compromised.
The remote Windows host uses the file SYSTEM32\Drivers\etc\HOSTS to fix
the name resolution of some sites like localhost or internal systems.
Some viruses or spywares modify this file to prevent the antivirus or
any other security software that requires to be up to date to work
Nessus has found one or multiple suspicious entries in this file that
may prove the remote host is infected by a malicious program.
See also :
Install/Update the antivirus and remove the malicious software.
Network Security Threat Level:
Critical / CVSS Base Score : 10
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
No Discussions have been posted on this vulnerability.